ClickHouse/base/common/phdr_cache.cpp

134 lines
3.2 KiB
C++
Raw Normal View History

2019-07-25 19:56:51 +00:00
/// This code was based on the code by Fedor Korotkiy (prime@yandex-team.ru) for YT product in Yandex.
2019-07-25 19:54:16 +00:00
#if defined(__has_feature)
#if __has_feature(address_sanitizer)
#define ADDRESS_SANITIZER 1
#endif
2019-07-25 22:18:27 +00:00
#if __has_feature(thread_sanitizer)
#define THREAD_SANITIZER 1
#endif
#else
#if defined(__SANITIZE_ADDRESS__)
#define ADDRESS_SANITIZER 1
#endif
#if defined(__SANITIZE_THREAD__)
#define THREAD_SANITIZER 1
#endif
2019-07-25 19:54:16 +00:00
#endif
2019-07-25 22:35:47 +00:00
#if defined(__linux__) && !defined(THREAD_SANITIZER)
#define USE_PHDR_CACHE 1
2019-07-25 19:54:16 +00:00
#endif
2019-09-12 11:40:01 +00:00
#define __msan_unpoison(X, Y)
#if defined(__has_feature)
# if __has_feature(memory_sanitizer)
# undef __msan_unpoison
# include <sanitizer/msan_interface.h>
# endif
#endif
2019-07-25 19:54:16 +00:00
2019-07-25 22:18:27 +00:00
/// Thread Sanitizer uses dl_iterate_phdr function on initialization and fails if we provide our own.
2019-07-25 22:35:47 +00:00
#ifdef USE_PHDR_CACHE
#include <link.h>
#include <dlfcn.h>
#include <vector>
#include <atomic>
#include <cstddef>
#include <stdexcept>
2019-07-25 22:18:27 +00:00
namespace
{
// This is adapted from
// https://github.com/scylladb/seastar/blob/master/core/exception_hacks.hh
// https://github.com/scylladb/seastar/blob/master/core/exception_hacks.cc
using DLIterateFunction = int (*) (int (*callback) (dl_phdr_info * info, size_t size, void * data), void * data);
DLIterateFunction getOriginalDLIteratePHDR()
{
void * func = dlsym(RTLD_NEXT, "dl_iterate_phdr");
if (!func)
throw std::runtime_error("Cannot find dl_iterate_phdr function with dlsym");
return reinterpret_cast<DLIterateFunction>(func);
}
2019-07-24 15:35:19 +00:00
2019-07-25 19:54:16 +00:00
using PHDRCache = std::vector<dl_phdr_info>;
std::atomic<PHDRCache *> phdr_cache {};
}
extern "C"
#ifndef __clang__
[[gnu::visibility("default")]]
[[gnu::externally_visible]]
#endif
int dl_iterate_phdr(int (*callback) (dl_phdr_info * info, size_t size, void * data), void * data)
{
2020-04-21 22:04:19 +00:00
auto * current_phdr_cache = phdr_cache.load();
2019-07-25 19:54:16 +00:00
if (!current_phdr_cache)
{
// Cache is not yet populated, pass through to the original function.
return getOriginalDLIteratePHDR()(callback, data);
}
int result = 0;
2019-07-25 19:54:16 +00:00
for (auto & entry : *current_phdr_cache)
{
2019-07-25 19:54:16 +00:00
result = callback(&entry, offsetof(dl_phdr_info, dlpi_adds), data);
if (result != 0)
break;
}
return result;
}
2019-07-25 22:35:47 +00:00
extern "C"
{
#ifdef ADDRESS_SANITIZER
void __lsan_ignore_object(const void *);
#else
void __lsan_ignore_object(const void *) {}
2019-07-25 22:18:27 +00:00
#endif
2019-07-25 22:35:47 +00:00
}
2019-07-25 22:18:27 +00:00
2019-07-25 19:54:16 +00:00
void updatePHDRCache()
{
// Fill out ELF header cache for access without locking.
// This assumes no dynamic object loading/unloading after this point
2019-07-25 19:54:16 +00:00
PHDRCache * new_phdr_cache = new PHDRCache;
getOriginalDLIteratePHDR()([] (dl_phdr_info * info, size_t /*size*/, void * data)
{
2019-09-12 11:40:01 +00:00
// `info` is created by dl_iterate_phdr, which is a non-instrumented
// libc function, so we have to unpoison it manually.
__msan_unpoison(info, sizeof(*info));
2019-07-25 19:54:16 +00:00
reinterpret_cast<PHDRCache *>(data)->push_back(*info);
return 0;
2019-07-25 19:54:16 +00:00
}, new_phdr_cache);
phdr_cache.store(new_phdr_cache);
/// Memory is intentionally leaked.
__lsan_ignore_object(new_phdr_cache);
2019-07-25 22:35:47 +00:00
}
2019-07-25 19:54:16 +00:00
2019-07-25 22:35:47 +00:00
bool hasPHDRCache()
{
return phdr_cache.load() != nullptr;
}
2019-07-25 22:35:47 +00:00
#else
void updatePHDRCache() {}
bool hasPHDRCache() { return false; }
#endif